Medi-Care Database Maintenance System

  • Authors

    • S. M. Keerthana
    • L. Priyanga Devi
    • D. Kavinya
    • N. Sharmila
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.19.22086
  • Memory storage, sharing, retrieval, confidentiality
  • The recent advances in information and communication technology are congregation; storage and information sharing are simple and faster. We propose the architecture that guarantees the personal exchange of knowledge between patients and doctors through the SAS (storage aggregation server) by using asymmetric cryptography, the encoding technique. The random key enhances the security for the biomedical data of each patient. We introduce the concept of double-phase micro aggregation to restrict the intruder entities without the loss of information. We have derived that double phase multivariate micro aggregation properly and also the reduction of memory storage.

     

     

  • References

    1. [1] Nishita Ramakrishnan and Sreerekha “Enhancing Security of Personal Health Records in Cloud Computing by Encryptionâ€. International Journal of Science and Research.

      [2] M. Naehrig, K. Lauter, and V. Vaikuntanathan. “Can homomorphic encryption be practical?†In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pp. 113-124, New York, USA, 2011.

      [3] S.Sheeba Rani, R.Maheswari, V.Gomathy and P.Sharmila, “Iot driven vehicle license plate extraction approach†in International Journal of Engineering and Technology(IJET) , Volume.7, pp 457-459, April 2018

      [4] G. Coker, J. Guttmann, P. Loscocco, A. Herzog, J. Millen, B. OHanlon, J. Ramsdell, A. Segall, J. Sheehy, and B. Sniffen. “Principles of remote attestationâ€. International Journal of Information Security, Volume 10, Issue 2, pp. 63-81, 2011.

      [5] X. Lei, X. Liao, T. Huang, H. Li and C. Hu. “Outsourcing Large Matrix Inversion Computation to a Public Cloudâ€. IEEE Transactions on Cloud Computing, Volume 1, Issue 2, pp. 78-89, 2013.

      [6] Trusted-Java: Jsr321: Trusted computing api for java(tm) (2009) Available at: http://jcp.org/en/jsr/detail?id=321. Accessed on 06/09/2013.

      [7] P. Tysowski and M. Hasan. “Hybrid Attribute- and Re-Encryption- Based Key Management for Secure and Scalable Mobile Applications in Cloudsâ€. IEEE Transactions on Cloud Computing, Volume 1, Issue 2, pp. 172-186, 2013.

      [8] S. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati. “Integrity for Join Queries in the Cloudâ€. IEEE Transactions on Cloud Computing, Volume 1, Issue 2, pp. 187-200, 2013.

      [9] X. Leroy. “Formal certification of a compiler back-end, or: programming a compiler with a proof assistantâ€. In 33RD Proceedings of ACM Symposium on Principles of Programming Languages, 2006.

      [10] M. S. Simi , K. Sankara Nayaki “Data analytics in medical data : A review†, 10.1109/ICCPCT.2017.8074337, 2017.

      [11] Subhash Chandra Pandey , “Data mining techniques for medical data: A reviewâ€, 10.1109/SCOPES.2016.7955586, 2017.

      [12] S. Balakrishnan, J. Janet, K.N. Sivabalan, “Secure Data Sharing In A Cloud Environment By Using Biometric Leakage resilient Authenticated Key Exchangeâ€, Pak. J. Biotechnol. Vol. 15 (2) 293-297 (2018).

      [13] J. Janet, S. Balakrishnan and E. Murali, "Improved data transfer scheduling and optimization as a service in cloud," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-3.
      doi: 10.1109/ICICES.2016.7518895.

      [14] Balakrishnan S., Janet J., Spandana S. â€Extensibility of File Set Over Encoded Cloud Data Through Empowered Fine Grained Multi Keyword Searchâ€. In: Deiva Sundari P., Dash S., Das S., Panigrahi B. (eds) Proceedings of 2nd International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 467. 2017. Springer, Singapore.

      [15] J. Janet, S. Balakrishnan and K. Somasekhara, "Fountain code based cloud storage mechanism for optimal file retrieval delay," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-4.
      doi: 10.1109/ICICES.2016.7518901.

      [16] J. Janet, S. Balakrishnan and E. R. Prasad, "Optimizing data movement within cloud environment using efficient compression techniques," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-5. doi: 10.1109/ICICES.2016.7518896.

  • Downloads

  • How to Cite

    M. Keerthana, S., Priyanga Devi, L., Kavinya, D., & Sharmila, N. (2018). Medi-Care Database Maintenance System. International Journal of Engineering & Technology, 7(4.19), 340-342. https://doi.org/10.14419/ijet.v7i4.19.22086